28
Evangelos Markatos, FORTH http:// dcs.ics.forth.gr [email protected] 1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science (ICS) Foundation for Research and Technology – Hellas (FORTH) Crete, Greece CyberSecurity

Evangelos Markatos, FORTH [email protected] CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

  • View
    235

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 1

CyberSecurity Research in Crete

Evangelos MarkatosInstitute of Computer Science (ICS)

Foundation for Research and Technology – Hellas (FORTH)Crete, Greece

CyberSecurity

Page 2: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 2

Roadmap

• The problem:– The trust that we used to place on our network is slowly

eroding away• We are being attacked

– Viruses, Worms, Trojans, keyboard loggers continue to plague our computers

• What do people say about this?– Europe – ENISA – USA – PITAC

• What can be done? The DCS approach– Understand

• mechanisms and causes of cyberattacks – Automate

• Detection of, fingerprinting of, and reaction to cyberattacks • Summary and Conclusions

Page 3: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 3

The erosion of trust on the Internet

• We used to trust computers we interacted with on the Internet– Not any more…

• Address bar spoofing: – Do you know that the web server http://www.paypal.com is the real

one?

Page 4: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 4

The erosion of trust on the Internet

• We used to trust our network – Not any more…

• Our network is the largest source of all attacks

• We used to trust our own computer– Not any more… (keyboard loggers can easily get all our

personal information)

Page 5: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 5

The erosion of trust on the Internet

• We used to trust our own eyes with respect to the content we were viewing on the Internet– Not any more…– Phishing: sophisticated social engineering

• Attackers send users email • On behalf of a legitimate sender (e.g. a bank) • Inviting them to sign-up for a service • When users click they are requested to give their password • Which ends up in the attacker’s database

Page 6: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 6

A simple phishing attack

Page 7: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 7

A sophisticated phishing attack: Setting the stage

• Attackers send email inviting Bank of America customers to change their address on-line

Page 8: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 8

A phishing attack: hiding the tracks

• Bank of America web site opens in the background• Pop-up window (from www.bofalert.com!) requests user name and

password

Legitimate Web site

Pop-up Window

Page 9: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 9

The boiling cauldron of Security

• Security on the Internet is getting increasingly important– Worms, Viruses, and trojians, continue to

disrupt our everyday activities – Spyware and backdoors continue to steal our

credit card numbers, our passwords, and snoop into our private lives

– Keyboard loggers can empty our bank accounts if they choose to do so

Page 10: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 10

It used to be a problem of PCs

• Not any more…

• PocketPC virus: – Duts

• Mobile phone virus:– Cabir – Infects the Symbian

operating system

Page 11: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 11

Mobile phone viruses: The Mosquitos virus

• Mosquitos Virus:– Attaches itself to an illegal copy of “Mosquitos” game– Once installed it starts sending potentially expensive

SMS messages to premium numbers – “free to download” but “expensive to play”

Page 12: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 12

The CommWarrior Worm

• Once installed – Searches or

nearby phones– Sends itself to

the owner's address list through MMS

– Using random names

• Difficult to filter out

Page 13: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 13

How much does it cost?

• Financial Cost: worms cost billions of euros to lost productivity– CodeRED Worm: $2.6 billion – Slammer: $1.2 billion– LoveLetter virus: $8.8 billion

• Could cyberattacks lead to loss of life? – What if a medical equipment gets infected by a worm?

• Wrong diagnosis? Wrong treatment? – What if a car gets infected by a worm?

• Could this lead to fatal car crash?

• How about Critical Infrastructures?• What if a Nuclear power plant gets infected?

– Would this lead to failure of safety systems? – Is this possible?

Page 14: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 14

How much does it cost?

• Worms have penetrated Nuclear Power plants. • “The Slammer worm penetrated a private computer network at

Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours”

Security Focus News

• Luckily no harm was made– The reactor was not operating at that time – There was a fall-back analog monitoring system

• Will we be so lucky next time?

Page 15: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 15

What do people say about this? ENISA

• ENISA: European Network and Information Security Agency

• PSG: Permanent Stakeholders Group• Vision Document

Page 16: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 16

ENISA Vision

• “The longer-term impact of … worm compromised hosts is likely to be greater in total than at present”

• “… Organized Crime and terrorists … introduce a level of sophistication and funding of (cyber)attacks that is far beyond what we have commonly seen in the previous 20 years of cyber security”

ENISA PSG i.e. things are bad and are going to get worse!

Page 17: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 17

What does the community say about this?What should we do?

• Feb. 2005

• President’s Information Technology Advisory Committee (in U.S.)

• Cyber-Security Sub-committee – David Patterson, UC Berkeley– Tom Leighton, MIT, – and several others

Page 18: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 18

Cyber-security Report

• Provide expert advice– In IT security

Page 19: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 19

Research Priorities Identified

• They identified 10 Research Priorities• We should do Research in:

– Global Scale Monitoring (for cyber-attacks)– Real-time Data collection storage and analysis (for

cyberattacks)– Automated (cyberattack) discovery from monitoring

data – Develop forensic-friendly architectures

To summarize:

Monitor for cyber-attacks and detect them early

Page 20: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 20

Cybersecurity Research in Crete

• At DCS we do just that

• Monitor, detect, and fingerprint – Cyberattacks

Page 21: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 21

Project Coordination

• LOBSTER: Large Scale Monitoring of Broadband Internet Infrastructure– SSA, Research Networking Testbed, funded

by IST, 9 partners

• NoAH: Network of Affined Honeypots– SSA (Design Study), Research Infrastructure– Funded by DG Research, 8 partners

Page 22: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 22

Publicity

Page 23: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 23

What is a honeypot?

• An “undercover” computer– which has no ordinary users – which provides no regular service

• Or a few selected services if needed

– Just waits to be attacked…

• Its value lies on being compromised – Or in being exploited, scanned, etc.

• Honeypots are an “easy” target– But heavily monitored ones

• If attacked, they log as much information as possible

Page 24: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 24

When was a honeypot first used?

• Widely publicized: The cuckoo’s egg– By Cliff Stoll

• Cliff Stoll noticed a 75-cent accounting error in the computer he managed – This led Cliff to discover an intruder named “Hunter” – Instead of shutting “Hunter” out, Cliff started to study him – He connected the modem lines to a printer – He created dummy “top-secret” directories to “lure”

“Hunter” into coming back – He was paged every time “Hunter” was in– He traced “Hunter” to a network of hackers

• Paid in cash and drugs and • Reporting directly to KGB

Page 25: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 25

How do we receive attacks?

• Three types of sensors:– Traditional honeypots who wait to be attacked– Collaborating organizations who install low-

interaction honeypots and forward “interesting” attacks to NoAH core

– Honey@Home: A “screensaver” who forwards all unwanted traffic to NoAH

• Unwanted traffic received at – unused IP addresses – unused TCP/UDP ports

Page 26: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 26

In Closing…

• In a week from today (May 17th) is the – World Telecommunication Day 2006 (WTD)

• Commemorates the founding of ITU

– WTD 200 is Dedicated to • “Promoting Global Cybersecurity”

Page 27: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 27

In Closing…

• Let us take this opportunity – Of the World Telecommunication Day– Dedicated to promoting Global Cybersecurity – And promote cybersecurity and Internet

Safety• By promoting awareness • By empowering small organizations• By empowering people to contribute and make a

difference

• Thank you all...

Page 28: Evangelos Markatos, FORTH  markatos@ics.forth.gr1 CyberSecurity Research in Crete Evangelos Markatos Institute of Computer Science

Evangelos Markatos, FORTH

http://dcs.ics.forth.gr

[email protected] 28

CyberSecurity Research in Crete

Evangelos MarkatosInstitute of Computer Science (ICS)

Foundation for Research and Technology – Hellas (FORTH)Crete, Greece

CyberSecurity